Proceedings of TCC 2005
Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings
, Springer
- Optimal Error Correction Against Computationally Bounded Noise., Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson, pp. 1-16
- PDF postscript BibTeX
- Hardness Amplification of Weakly Verifiable Puzzles., Ran Canetti, Shai Halevi, Michael Steiner, pp. 17-33
- PDF postscript BibTeX
- On Hardness Amplification of One-Way Functions., Henry Lin, Luca Trevisan, Hoeteck Wee, pp. 34-49
- PDF postscript BibTeX
- Cryptography in Subgroups of Zn., Jens Groth, pp. 50-65
- PDF postscript BibTeX
- Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs., Moni Naor, Asaf Nussboim, Eran Tromer, pp. 66-85
- PDF postscript BibTeX
- Comparing Two Notions of Simulatability., Dennis Hofheinz, Dominique Unruh, pp. 86-103
- PDF postscript BibTeX
- Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation., Manoj Prabhakaran, Amit Sahai, pp. 104-127
- PDF postscript BibTeX
- Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs., Jonathan Katz, Yehuda Lindell, pp. 128-149
- PDF postscript BibTeX
- Adaptively-Secure, Non-interactive Public-Key Encryption., Ran Canetti, Shai Halevi, Jonathan Katz, pp. 150-168
- PDF postscript BibTeX
- Adaptive Security of Symbolic Encryption., Daniele Micciancio, Saurabh Panjwani, pp. 169-187
- PDF postscript BibTeX
- Chosen-Ciphertext Security of Multiple Encryption., Yevgeniy Dodis, Jonathan Katz, pp. 188-209
- PDF postscript BibTeX
- Public-Key Steganography with Active Attacks., Michael Backes, Christian Cachin, pp. 210-226
- PDF postscript BibTeX
- Upper and Lower Bounds on Black-Box Steganography., Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell, pp. 227-244
- PDF postscript BibTeX
- Fair-Zero Knowledge., Matt Lepinski, Silvio Micali, Abhi Shelat, pp. 245-263
- PDF postscript BibTeX
- How to Securely Outsource Cryptographic Computations., Susan Hohenberger, Anna Lysyanskaya, pp. 264-282
- PDF postscript BibTeX
- Secure Computation of the Mean and Related Statistics., Eike Kiltz, Gregor Leander, John Malone-Lee, pp. 283-302
- PDF postscript BibTeX
- Keyword Search and Oblivious Pseudorandom Functions., Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold, pp. 303-324
- PDF postscript BibTeX
- Evaluating 2-DNF Formulas on Ciphertexts., Dan Boneh, Eu-Jin Goh, Kobbi Nissim, pp. 325-341
- PDF postscript BibTeX
- Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation., Ronald Cramer, Ivan Damgård, Yuval Ishai, pp. 342-362
- PDF postscript BibTeX
- Toward Privacy in Public Databases., Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith, Hoeteck Wee, pp. 363-385
- PDF postscript BibTeX
- The Universal Composable Security of Quantum Key Distribution., Michael Ben-Or, Michal Horodecki, Debbie W. Leung, Dominic Mayers, Jonathan Oppenheim, pp. 386-406
- PDF postscript BibTeX
- Universally Composable Privacy Amplification Against Quantum Adversaries., Renato Renner, Robert König, pp. 407-425
- PDF postscript BibTeX
- A Universally Composable Secure Channel Based on the KEM-DEM Framework., Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto, pp. 426-444
- PDF postscript BibTeX
- Sufficient Conditions for Collision-Resistant Hashing., Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, pp. 445-456
- PDF postscript BibTeX
- The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives., Minh-Huyen Nguyen, pp. 457-475
- PDF postscript BibTeX
- On the Relationships Between Notions of Simulation-Based Security., Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan, pp. 476-494
- PDF postscript BibTeX
- A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes., Maria Isabel Gonzalez Vasco, Consuelo Martínez, Rainer Steinwandt, Jorge Luis Villar, pp. 495-509
- PDF postscript BibTeX
- Further Simplifications in Proactive RSA Signatures., Stanislaw Jarecki, Nitesh Saxena, pp. 510-528
- PDF postscript BibTeX
- Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem., Shafi Goldwasser, Dmitriy Kharchenko, pp. 529-555
- PDF postscript BibTeX
- Entropic Security and the Encryption of High Entropy Messages., Yevgeniy Dodis, Adam Smith, pp. 556-577
- PDF postscript BibTeX
- Error Correction in the Bounded Storage Model., Yan Zong Ding, pp. 578-599
- PDF postscript BibTeX
- Characterizing Ideal Weighted Threshold Secret Sharing., Amos Beimel, Tamir Tassa, Enav Weinreb, pp. 600-619
- PDF postscript BibTeX
[ IACR home page ]
© IACR